Scenario  You work for a medium-sized company that provides financial services t

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Scenario 
You work for a medium-sized company that provides financial services to clients. Recently, the company’s IT department detected some suspicious activity on the network and conducted an investigation. They found that one of the employees had been accessing sensitive client data without authorization and had copied some of the data onto a USB drive. The employee has been terminated, but the company is concerned that there may be other employees who have engaged in similar behavior. They have asked for your advice on how to conduct a digital forensics investigation to identify any additional unauthorized access to client data.
Background Information
The company’s IT department has collected log files and system images from the employee’s workstation and the network devices that the employee accessed.
The company has a backup of the employee’s email account and is able to provide access to other company systems that the employee had access to.
The company has asked you to provide recommendations on how to conduct a digital forensics investigation to identify any additional unauthorized access to client data.
Instructions
Assume the role of a digital forensics consultant and provide recommendations to the company on how to conduct a digital forensics investigation. Create a report summarizing your recommendations. 
Your report should be 10 to 12 pages in length. The maximum length is 15 pages. You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Please include a mix of both primary and secondary sourcesLinks to an external site., with at least one source from a security journal. If you use any Study.com lessonsLinks to an external site. as sources, please also cite them in MLA (including the lesson title and instructor’s name). Ensure that your paper includes information on the following:
Your recommendations should cover the following topics:
The investigation process and phases
Data acquisition and preservation
Examination and analysis techniques
Network forensics and web application forensics
Anti-forensics techniques and countermeasures
Legal compliance issues
Provide specific recommendations on how the company should proceed, including what tools and techniques they should use.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now